<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rex field extraction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640575#M221949</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/237518"&gt;@zacksoft_wf&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's used when the log is multirow.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the Contributors&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Apr 2023 12:00:31 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-04-19T12:00:31Z</dc:date>
    <item>
      <title>Rex field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640567#M221946</link>
      <description>&lt;P&gt;I have a field called 'description'. I want to be able to extract&amp;nbsp;&lt;SPAN&gt;MD5, SHA1, SHA256 values present in this field.&lt;BR /&gt;Need help with regular expression. Here is an example of the field value. It's pretty huge. Towards the last you will notice&amp;nbsp;MD5, SHA1, SHA256 values.&lt;BR /&gt;&lt;BR /&gt;Example:&lt;BR /&gt;============&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Family: alien&lt;/P&gt;&lt;P&gt;alien is a credential theft malware designed to run on a mobile phone running the Android operating system. This malware will attempt to monitor the users activities and steal their data by either logging keystrokes, copying their clipboard content or applying a overlay on top of legitimate applications the malware is instructed to monitor for.&lt;/P&gt;&lt;P&gt;Pattern(s) extracted from web_inject config for this family:&lt;BR /&gt;&lt;BR /&gt;com.wf.Tubeswatermobile&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Infrastructure: hxxp://yektkedecaedem.shop&lt;BR /&gt;Type: CNC&lt;/P&gt;&lt;P&gt;Infrastructure purpose: A CNC is the interface between the botnet and the threat actor, allowing the threat actor to send commands, exfiltrate data and manage an infected machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Virustotal Report: &lt;A href="https://www.virustotal.com/gui/url/b2eba8fb7266c50f23d71d1ref5c5df663962eccf1420d59a14ee2hb5005f6fb/detection" target="_blank"&gt;https://www.virustotal.com/gui/url/b2eba8fb7266c50f23d71d1ref5c5df663962eccf1420d59a14ee2hb5005f6fb/detection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Associated Payload Hashes:&lt;BR /&gt;&lt;STRONG&gt;MD5&lt;/STRONG&gt; 9fagf968da04a2bb464f4842ebd1bd29&lt;BR /&gt;&lt;STRONG&gt;SHA1&lt;/STRONG&gt; 0bacdak9d1a7dbb975759d687645006f875a388b&lt;BR /&gt;&lt;STRONG&gt;SHA256&lt;/STRONG&gt; ba57be868c89b4a342c412c066dc58ed9a888f8009ec512917004380d8e8233e&lt;/P&gt;&lt;P&gt;&lt;A href="http://yeytledfcaeden.shop" target="_blank"&gt;http://yeytledfcaeden.shop&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;============&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 10:50:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640567#M221946</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2023-04-19T10:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Rex field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640569#M221947</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/237518"&gt;@zacksoft_wf&lt;/a&gt; , try the following rex that will create 3 fields, one for each hash.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex field=description "(?ms)MD5\s+(?&amp;lt;md5&amp;gt;\w+)\s+SHA1\s+(?&amp;lt;sha1&amp;gt;\w+)\s+SHA256\s+(?&amp;lt;sha256&amp;gt;\w+)"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 10:57:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640569#M221947</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2023-04-19T10:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: Rex field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640571#M221948</link>
      <description>&lt;P&gt;Thank you. May I ask what the "?ms"&amp;nbsp; is for?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 11:21:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640571#M221948</guid>
      <dc:creator>zacksoft_wf</dc:creator>
      <dc:date>2023-04-19T11:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Rex field extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640575#M221949</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/237518"&gt;@zacksoft_wf&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's used when the log is multirow.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the Contributors&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 12:00:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Rex-field-extraction/m-p/640575#M221949</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-04-19T12:00:31Z</dc:date>
    </item>
  </channel>
</rss>

